Showing 8,121 - 8,140 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 8121

    Environmental literacy, the key to sustainable conservation of wetlands in urban areas by Cain NZVERE, Lovemore CHIRUBVU, Thebeth MASUNDA

    Published 2024-01-01
    “…The study concluded that individuals are more concerned with their primary needs of securing food and shelter, with little or no consideration of the after effects of such on the environment which include individual heath, as well as depreciation of other services and goods found in wetlands. …”
    Get full text
    Article
  2. 8122

    Simulation and Strategy for Salinity Control Scheduling in Dongjiang Delta of Pearl River Basin in Severe Drought Year by LIN Zhongyuan, TANG Qi, WANG Fengen, XU Wei, HUANG Pengfei, ZOU Huazhi

    Published 2024-07-01
    “…This will essentially ensure the water supply security in the Dongjiang Delta. This paper provides some reference for the river discharge dispatching and salinity control during the dry season in the Dongjiang Delta.…”
    Get full text
    Article
  3. 8123
  4. 8124

    Mineral Composition of Lentils: Physiological Functions, Antinutritional Effects, and Bioavailability Enhancement by Asmaa Benayad, Youssef Aboussaleh

    Published 2021-01-01
    “…Thus, lentils play a major role in food security, particularly among low-income countries. …”
    Get full text
    Article
  5. 8125

    Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm by Meixi Chen

    Published 2021-01-01
    “…The 3DES encryption algorithm achieves one encryption process at a time to some extent, can effectively resist exhaustive search attacks, and enhance the security of the DES algorithm.…”
    Get full text
    Article
  6. 8126

    The concept of civil law incentives by Yu. I. Chalyi

    Published 2024-12-01
    “…This is especially evident in contractual relations of obligation. The regulatory (security) function of civil law incentives is associated with the legal formalisation of achieving, first and foremost, private interests. …”
    Get full text
    Article
  7. 8127

    Challenging Our Assumptions: Listening to Refugee and Immigrant Women’s Voices About Career Aspirations by Angela Warner, Dahlia Herring, Lisa E. Baranik, Janice Coles

    Published 2025-01-01
    “…These newcomers face significant barriers to obtaining economic stability. Those who secure a job usually work in low-paying, entry-level positions such as food service, hospitality, or cleaning. …”
    Get full text
    Article
  8. 8128

    Principles of Preventive Police Activity: Concepts, Content and Their Classification by S. O. Shatrava, H. R. Parkhanov

    Published 2019-09-01
    “…The principles of preventive activities, depending on the method of their regulatory consolidation, are classified into: 1) general legal principles that determine the principles of formation and implementation of state policy in the field of national security; 2) basic principles that characterize the purposefulness, content and limits of police activity and are enshrined in the provisions of the Law of Ukraine “On the National Police”; 3) special principles that characterize the specificity of preventive police activity. …”
    Get full text
    Article
  9. 8129

    Development and Validation of Cloud-based Heart Rate Variability Monitor by Sushma N. Bhat, Ghanshyam D. Jindal, Gajanan D. Nagare

    Published 2024-12-01
    “…Aims: Medical investigations carried out at dispensaries or hospitals impose substantial physiological and psychological stress (white coat effect), disrupting cardiovascular homeostasis, which can be taken care by point-of-care cloud computing system to facilitate secure patient monitoring. Settings and Design: The device employs MAX30102 sensor to collect peripheral pulse signal using photoplethysmography technique. …”
    Get full text
    Article
  10. 8130

    The “Nixon China Shock” in the Mirror of Japanese Domestic Politics by V. V. Nelidov

    Published 2019-12-01
    “…Nixon about the recent trip of his National Security Advisor H. Kissinger to the PRC and about the President’s upcoming visit there) became one of the pivotal points in the history of Japanese foreign policy and contributed to Tokyo becoming more independent from Washington in its diplomatic course. …”
    Get full text
    Article
  11. 8131

    Global FRAND-Licensing by EU National Courts: The Winner Asks Them All? – On Global SEP Disputes and International Jurisdiction by Stefanie Krome

    Published 2023-06-01
    “…Parties are fighting to secure jurisdictions for a judicially determined portfolio FRAND licence by seeking anti-suit-injunctions or anti-anti-suitinjunctions (and so on). …”
    Get full text
    Article
  12. 8132

    Assessment of Production and Utilization Practices of Orange-Fleshed Sweet Potatoes (Ipomoea Batatas L.) in Sidama Region, Ethiopia by Miheret Hendebo, Ali Mohammed Ibrahim, Fekadu Gurmu, Hussien Mohammed Beshir

    Published 2022-01-01
    “…Sweet potato (Ipomoea batatas L.) is an important crop which ensures food security in developing countries. It can be harvested at any stage as needed, thereby providing a flexible source of food and income for rural families that are most vulnerable to crop failures and cash income fluctuations. …”
    Get full text
    Article
  13. 8133

    Perspectives of high-risk pregnant women on home care program in high-risk pregnancies: A multicenter, qualitative study by Masoumeh Sayahi, Shahrbanoo Salehin, Mehrnoosh Zakerkish, Afsaneh Keramat, Shahrbanoo Goli

    Published 2025-01-01
    “…The themes and categories were “high-risk pregnancy and related issues (pursuing treatment and paying attention to the high-risk situation by pregnant women, psychological aspect of high-risk pregnancy on pregnant women and caregivers, emotional and physical aspects of high-risk pregnancy, the consequences of high-risk pregnancy on the people around them and empowerment of high-risk pregnant women)”, “support dimension (family and community support for high-risk pregnant women)”, and “framework of program (acculturalization, means and equipment, security, manpower and the necessary arrangements for the home care)”. …”
    Get full text
    Article
  14. 8134

    Characterizing agronomic, morphological, nutritional, and phytochemical traits of local sorghum (Sorghum bicolor L.) in Indonesia by Maisya Zahra Al Banna, Widiastini Arifuddin

    Published 2024-07-01
    “…These findings highlight the potential of local Tritiro sorghum as a valuable nutritional resource and its suitability for cultivation in the region, contributing to food security and sustainable agricultural practices. …”
    Get full text
    Article
  15. 8135
  16. 8136

    Comparative Analysis of Visual Field Characteristics and Perceptual Processing in Peripheral Vision Between Virtual Reality and Real World by Dan Bürger, Marc-Kevin Schley, Hannes Loerwald, Stefan Pastel, Kerstin Witte

    Published 2024-01-01
    “…In various domains, virtual reality (VR) has emerged as a valuable tool for simulating specific scenarios and facilitating training within controlled and secure conditions. As peripheral vision plays a crucial role in numerous contexts, it must be duly considered in VR simulations. …”
    Get full text
    Article
  17. 8137

    RUSSIAN-ARAB COOPERATION BEFORE AND AFTER THE "ARAB SPRING" by M. A. Sapronova

    Published 2014-06-01
    “…Ultimately, the firm position of Russia on the Syrian issue secured her role as an important political player in the Middle East. …”
    Get full text
    Article
  18. 8138

    Cleaner Production Quality Regulation Strategy of Pharmaceutical with Collusive Behavior and Patient Feedback by Junmei Rong, Lilong Zhu

    Published 2020-01-01
    “…The quality of pharmaceuticals has always been a hot issue in the world, and it involves public health, economic development of countries, social stability, and national security. Cleaner production is a prerequisite for ensuring the quality of medicines. …”
    Get full text
    Article
  19. 8139

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  20. 8140

    Asynchronous Advanced Encryption Standard Hardware with Random Noise Injection for Improved Side-Channel Attack Resistance by Siva Kotipalli, Yong-Bin Kim, Minsu Choi

    Published 2014-01-01
    “…A novel method to further augment NCL AES hardware with random voltage scaling technique is also presented for additional security. Thereby, the proposed components leak significantly less side-channel information than conventional clocked approaches. …”
    Get full text
    Article